High-tech

High-tech
Light

Friday, January 17, 2014

BREAKING: Obama praises NSA, offers little in mass surveillance reform

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jan 17, 2014 1:36 PM
Subject: BREAKING: Obama praises NSA, offers little in mass surveillance reform
To: <aquarianm@gmail.com>
Cc:

In Pictures: Obama and the NSA morass

10 oddball real-world tech job interview questions

Network World Daily News PM
January 17, 2014
Share this email

BREAKING: Obama praises NSA, offers little in mass surveillance reform

President skirts most reform recommendations made by his appointed panel in December

READ MORE
 

Issue highlights

1. In Pictures: Obama and the NSA morass

2. 10 oddball real-world tech job interview questions

3. MobileSpaces: secure, full Google App support to iOS and Android

4. Declassified: How to get around electronic jamming circa 1960

5. INSIDER Customer Experience Means Never Having to Repeat Yourself

6. Security risk in Starbucks app a 'wakeup call' for consumers

7. Schools battle anonymous proxies as pupils find ways around filtering

8. The Target Breach: Another PR blow for antivirus software

9. Watch out Amazon: What IBM's $1.2B cloud investment really means

10. Full text of President Obama's intelligence directive

RESOURCE COMPLIMENTS OF: CIO Perspectives Dallas Conference

Special Invite to CIO Perspectives Dallas Conference-Feb 25

Agenda highlights include: Innovative Approaches to Digital Disruption & Business Model Change; Transforming the IT-Business Partnership; Finding and Keeping Great IT Talent; Strategies for C-Suite Leadership & Success; Innovative Approaches to Digital Disruption & Business Model Change. Visit our website and register today!

In Pictures: Obama and the NSA morass

New rules will limit NSA data gathering, but is the NSA paying attention? READ MORE

10 oddball real-world tech job interview questions

You better know your pizza… READ MORE

MobileSpaces: secure, full Google App support to iOS and Android

One of the challenges of allowing mobile workers to utilize their mobile devices is that while many apps can be run, the platform can make them insecure. MobileSpaces has just released the newest version of its container based workspace which allows users to run apps such as Google Ap READ MORE

WEBCAST: IBM

Business Value of Creating Exceptional Digital Experiences

Watch this on-demand webcast to review the findings of IDC's recent analytical report titled: "The Business Value of IBM's Exceptional Digital Experience Solutions." Learn More

Declassified: How to get around electronic jamming circa 1960

Sometimes you see declassified video or data and wonder how it ever became classified in the first place - and sometimes you can sort of understand. The National Archives recently declassified an interesting video that details a way, using mostly hand-drawn images and a "dramatic soundtrack," to explain one way the US Air Force used to get around electronic jamming technologies. Such technologies... READ MORE

INSIDER

Customer Experience Means Never Having to Repeat Yourself

Bank of America experiments with real-time video and chat in online, in-person and mobile channels to improve customer service READ MORE

Security risk in Starbucks app a 'wakeup call' for consumers

The weak protections for customer data in Starbucks' mobile-payment app is a "wakeup call" for consumers who should never assume the apps they use in their smartphones are secure. READ MORE

WEBCAST: Silver Peak Systems, Inc.

Combat Disasters And Optimize Business Operations

Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication strategies and technologies. View now >>

Schools battle anonymous proxies as pupils find ways around filtering

Many schools are dedicating valuable IT resources to countering the anonymous proxies that have become a popular way to evade web content filtering systems, a survey of UK and US institutions has found. READ MORE

The Target Breach: Another PR blow for antivirus software

I posted a blog earlier this week on the endpoint security market transition that ESG anticipates in 2014. ESG research already indicates that change is in the air --62% of security professionals working at enterprise organizations (i.e. more than 1,000 employees) believe that traditional endpoint security software is not effective for detecting zero-day and/or polymorphic malware commonly used as... READ MORE

Watch out Amazon: What IBM's $1.2B cloud investment really means

In classic IBM marketing flavor, Big Blue announced today a big investment into the cloud: $1.2 billion over the next two years to significantly beef up its international data center footprint for its cloud. READ MORE

Full text of President Obama's intelligence directive

President Barack Obama today issued new directions for the government's intelligence to follow. Among the items released today were an official Presidential Directive and a Fact Sheet on the details of the new policy. READ MORE

WHITE PAPER: Dell

Enterprise Governance and Automation for AWS & Hybrid Clouds

Cloud solutions like AWS allow you to increase operational agility and reduce costs. Now you need a fast and easy way to increase security, improve governance and simplify hybrid cloud management. That's where a cloud management solution comes into play. View Now

SLIDESHOWS

The worst data breach incidents of 2013

These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. This Raspberry Pi Tablet is absolutely gorgeous

2. Encrypted messaging startup Wickr offers $100K bug bounty

3. 14 steps to a better, faster Windows laptop

4. 8 ways that Chrome may be challenging Windows

5. Cisco: Thousands of web hosting centers now launchpads for attacks

6. How to make 96,000lbs of WWII machinery into high-tech research platform

7. 12 toughest U.S. cities for tech recruiting

8. Microsoft Hyper-V bangs away at VMware's popularity

9. SDN will never happen, says VMware exec

10. Juniper announces Firefly Suite for virtual-machine security

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment